This page provides information about the security practices that we undertake to support delivery of our Re-TRAC Connect™ service and our RecycleSearch™ service (collectively, the “Services” and individually a “Service”). Terms used on this page but not defined have the meaning set forth in the Customer Terms of Service. "Emerge Knowledge,” “we,” “our,” or “us” refer to Emerge Knowledge Design Inc., the owner of this website and the provider of the Services.

We maintain PCI compliance pass status, and scan all of our Internet-facing networks and systems with Six Sigma (99.9996%) accuracy, on a quarterly schedule.

Data Encryption In-Transit

We use industry standard Transport Layer Security (“TLS”) to create a secure connection, including all data sent between Users and our Services, with 128/256-bit Advanced Encryption Standard (“AES”) encryption. There is no non-TLS option for connecting to our web services; all connections are made securely over Hypertext Transfer Protocol Secure (HTTPS).

Vulnerability Detection

We perform quarterly vulnerability, penetration, and intrusion detection scanning using QualysGuard PCI and Qualys SSL Labs services on a quarterly basis. This process detects programming vulnerabilities related to security, SSL / TLS security, other known issues and vulnerabilities. Vulnerability and security lists are monitored daily for Common Vulnerabilities and Exposures (CVE) whereby we remediate any findings that present a risk to our environment. We are committed to vulnerability detection monitoring towards protecting our production systems from unauthorized access or attack.

Network Security

We use AWS Network Access Control List (ACL) and AWS Security Groups to restrict access to systems. System firewalls are configured according to industry best practices and unnecessary ports are blocked. We securely connect to the AWS data center using 256-bit AES encryption.

Anti-Virus Protection

We maintain a centrally managed antivirus solution deployed across our work environments (Windows and macOS) that runs real-time monitoring with daily updates.

Incident Management & Response

In the event of a security breach, we will promptly notify our customers (via Notices contact) of any unauthorized access to your customer data. We have incident management procedures in place to handle such an event.

Personnel

All employees must pass a police background check prior to employment, and must read and agree with our policies. Only authorized personnel have access to the production system whereby administrative accounts have the minimum access required to perform their function (principle and practice of least-privilege), and administrative access to our production servers requires SSH keys. To successfully deliver the Services, some employees require access to customer data (to provide dedicated services and for testing and problem diagnosis); all actions are logged in the system. Upon termination, all authorized personnel and employee access is removed.